Skip to content

How to detect MFA bypass attempts on your VPN.

Attackers try to bypass MFA via push bombing, MFA fatigue, OAuth grant abuse or legacy protocol abuse. Login event logging is your only real friend.

Try this first

  1. 1Log all authentication events with geo, user agent and success/failure.
  2. 2Alarm on more than 3 failed MFA prompts in 5 minutes for the same user (push fatigue).
  3. 3Block legacy auth (basic auth) on Microsoft 365, by far the most abused VPN bypass.
  4. 4Geo impossible travel: login from NL then Brazil 10 min later = auto revoke.

When to bring us in

You have no SIEM and login events are not retained: at minimum enable Microsoft Sentinel or Defender XDR for 90 days, otherwise you cannot even reconstruct a breach.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.